top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The global race for technological superiority : discover the security implications / / edited by Fabio Rugge
The global race for technological superiority : discover the security implications / / edited by Fabio Rugge
Pubbl/distr/stampa Milan, Italy : , : Ledizioni, , [2020]
Descrizione fisica 1 electronic resource (183 p.)
Disciplina 327
Collana Pubblicazioni ISPI
Soggetto topico Technology and international relations
Cyberspace - Political aspects
Security, International
Cyberspace - Security measures
ISBN 88-5526-144-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction / John R. Allen, Giampiero Massolo -- Emerging disruptive technologies and international stability / Fabio Rugge -- Disruptive technologies in military affairs / Gabriele Rizzo -- Why 5G requires new approaches to cybersecurity / Tom Wheeler, David Simpson -- AI in the aether : military information conflict / Tom Stefanick -- Artificial intelligence, geopolitics, and information integrity / John Villasenor -- Norms and strategies for stability in cyberspace / Mariarosaria Taddeo -- Will authoritarian regimes lead in the technology race? / Samuele Dominioni.
Record Nr. UNINA-9910367723303321
Milan, Italy : , : Ledizioni, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Google predicament [[electronic resource] ] : transforming U.S. cyberspace policy to advance democracy, security, and trade : hearing before the Committee on Foreign Affairs, House of Representatives, One Hundred Eleventh Congress, second session, March 10, 2010
The Google predicament [[electronic resource] ] : transforming U.S. cyberspace policy to advance democracy, security, and trade : hearing before the Committee on Foreign Affairs, House of Representatives, One Hundred Eleventh Congress, second session, March 10, 2010
Pubbl/distr/stampa Washington : , : U.S. G.P.O., , 2010
Descrizione fisica 1 online resource (iii, 125 pages)
Soggetto topico Cyberspace - Security measures
Internet - Political aspects - China
Internet - Economic aspects
Information warfare - United States - Prevention
National security - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Google predicament
Record Nr. UNINA-9910699572903321
Washington : , : U.S. G.P.O., , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
H4ckers5 wanted : an examination of the cybersecurity labor market / / Martin C. Libicki, David Senty, Julia Pollak ; cover design by Dori Walker
H4ckers5 wanted : an examination of the cybersecurity labor market / / Martin C. Libicki, David Senty, Julia Pollak ; cover design by Dori Walker
Autore Libicki Martin C.
Pubbl/distr/stampa Santa Monica, California : , : RAND, , 2014
Descrizione fisica 1 online resource (107 p.)
Disciplina 331.7/610058
Soggetto topico Computer crimes - Prevention
Cyberspace - Security measures
Professions - Supply and demand
Hackers
ISBN 0-8330-8501-8
0-8330-8503-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Preface; Contents; Figures and Table; Summary; Acknowledgments; Abbreviations; Prologue; Organization; Chapter One: Why Has Demand Risen Sharply?; The Federal/Military Cybersecurity Workforce Problem; Levels of the Game; Chapter Two: What Others Have Observed; GAO, Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination; Partnership for Public Service and BAH, "Cyber IN-Security: Strengthening the Federal Cybersecurity Workforce"; CSIS Commission on Cybersecurity for the 44th Presidency,; DoD, Cyber Operations Personnel Report
Homeland Security Advisory Council, Cyber Skills Task Force Repor tAmyas Morse, The UK Cyber Security Strategy: Landscape Review; Other Articles; Conclusions; Chapter Three: Findings from Interviews and Statistics; How Employers Meet their Need for Cybersecurity Professionals; NSA; Central Intelligence Agency; USCYBERCOM; USAF; The Role of Education; Cybersecurity Programs; Overall Statistics; Chapter Four: The Economics of the Cybersecurity Labor Market; A Simplified View of the Labor Market for Cyberprofessionals; The Adjustment of Labor Demand to Shocks; Differences in Human Capital
Factors Related to Government Agency Characteristics Geographic Considerations; Summary; Chapter Five: Upper-Tier Cybersecurity Professionals and Policy Options; The Search for the Upper-Tier Cybersecurity Professional; Policy Options for Meeting Cybersecurity Needs; Recruit Early; Use Foreign Nationals; Differentiate Job Categories More Precisely; Address Civil Service Issues; Review Veterans' Preferences; Use Guard and Reserve Units; Outsource More; Reducing the Demand for Cybersecurity Professionals; Chapter Six: Conclusions; In the Longer Run; References
Record Nr. UNINA-9910220146103321
Libicki Martin C.  
Santa Monica, California : , : RAND, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HotWeb 2017 : proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies : San Jose, CA, USA, October 14, 2017 / / Qun Li, Songqing Chen
HotWeb 2017 : proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies : San Jose, CA, USA, October 14, 2017 / / Qun Li, Songqing Chen
Autore Li Qun <1912-2012, >
Pubbl/distr/stampa New York : , : Association for Computing Machinery, , 2017
Descrizione fisica 1 online resource (97 pages)
Disciplina 355.343
Soggetto topico Cyberspace - Security measures
World Wide Web
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910376032403321
Li Qun <1912-2012, >  
New York : , : Association for Computing Machinery, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How to Measure Anything in Cybersecurity Risk / / Douglas W. Hubbard and Richard Seiersen
How to Measure Anything in Cybersecurity Risk / / Douglas W. Hubbard and Richard Seiersen
Autore Hubbard Douglas W. <1962->
Edizione [Second edition.]
Pubbl/distr/stampa Wiley-Blackwell
Descrizione fisica 1 online resource (366 pages)
Disciplina 658.478
Soggetto topico Cyberspace - Security measures
Cyberterrorism
Risk management
ISBN 1-119-89232-5
1-119-89231-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Foreword for the Second Edition -- Acknowledgments -- Preface -- How to Measure Anything in Cybersecurity Risk -- Introduction -- Why We Chose This Topic -- What Is This Book About? -- We Need More Than Technology -- Part I Why Cybersecurity Needs Better Measurements for Risk -- Chapter 1 The One Patch Most Needed in Cybersecurity -- Insurance: A Canary in the Coal Mine -- The Global Attack Surface -- The Cyber Threat Response -- A Proposal for Cybersecurity Risk Management -- Notes -- Chapter 2 A Measurement Primer for Cybersecurity -- The Concept of Measurement -- A Taxonomy of Measurement Scales -- The Object of Measurement -- The Methods of Measurement -- Notes -- Chapter 3 The Rapid Risk Audit: Starting With a Simple Quantitative Risk Model -- The Setup and Terminology -- The Rapid Audit Steps -- Some Initial Sources of Data -- The Expert as the Instrument -- Supporting the Decision: Return on Controls -- Doing "Uncertainty Math" -- Visualizing Risk With a Loss Exceedance Curve -- Where to Go from Here -- Notes -- Chapter 4 The Single Most Important Measurement in Cybersecurity -- The Analysis Placebo: Why We Can't Trust Opinion Alone -- How You Have More Data than You Think -- When Algorithms Beat Experts -- Tools for Improving the Human Component -- Summary and Next Steps -- Notes -- Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk -- Scanning the Landscape: A Survey of Cybersecurity Professionals -- What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix -- Exsupero Ursus and Other Fallacies -- Communication and Consensus Objections -- Conclusion -- Notes -- Part II Evolving the Model of Cybersecurity Risk -- Chapter 6 Decompose It: Unpacking the Details -- Decomposing the Simple One-for-One Substitution Model.
More Decomposition Guidelines: Clear, Observable, Useful -- A Hard Decomposition: Reputation Damage -- Conclusion -- Notes -- Chapter 7 Calibrated Estimates: How Much Do You Know Now? -- Introduction to Subjective Probability -- Calibration Exercise -- More Hints for Controlling Overconfidence -- Conceptual Obstacles to Calibration -- The Effects of Calibration -- Beyond Initial Calibration Training: More Methods for Improving Subjective Judgment -- Notes -- Answers to Trivia Questions for Calibration Exercise -- Chapter 8 Reducing Uncertainty with Bayesian Methods -- A Brief Introduction to Bayes and Probability Theory -- An Example from Little Data: Does Multifactor Authentication Work? -- Other Ways Bayes Applies -- Notes -- Chapter 9 Some Powerful Methods Based on Bayes -- Computing Frequencies with (Very) Few Data Points: The Beta Distribution -- Decomposing Probabilities with Many Conditions -- Reducing Uncertainty Further and When to Do It -- More Advanced Modeling Considerations -- Wrapping Up Bayes -- Notes -- Part III Cybersecurity Risk Management for the Enterprise -- Chapter 10 Toward Security Metrics Maturity -- Introduction: Operational Security Metrics Maturity Model -- Sparse Data Analytics -- Functional Security Metrics -- Functional Security Metrics Applied: BOOM! -- Wait-Time Baselines -- Security Data Marts -- Prescriptive Analytics -- Notes -- Chapter 11 How Well Are My Security Investments Working Together? -- Security Metrics with the Modern Data Stack -- Modeling for Security Business Intelligence -- Addressing BI Concerns -- Just the Facts: What Is Dimensional Modeling, and Why Do I Need It? -- Dimensional Modeling Use Case: Advanced Data Stealing Threats -- Modeling People Processes -- Conclusion -- Notes -- Chapter 12 A Call to Action: How to Roll Out Cybersecurity Risk Management -- Establishing the CSRM Strategic Charter.
Organizational Roles and Responsibilities for CSRM -- Getting Audit to Audit -- What the Cybersecurity Ecosystem Must Do to Support You -- Integrating CSRM with the Rest of the Enterprise -- Can We Avoid the Big One? -- Appendix A Selected Distributions -- Distribution Name: Triangular -- Distribution Name: Binary -- Distribution Name: Normal -- Distribution Name: Lognormal -- Distribution Name: Beta -- Distribution Name: Power Law -- Appendix B Guest Contributors -- Decision Analysis to Support Ransomware Cybersecurity Risk Management -- Bayesian Networks: One Solution for Specific Challenges in Building ML Systems in Cybersecurity -- The Flaw of Averages in Cyber Security -- Botnets -- Password Hacking -- How Catastrophe Modeling Can Be Applied to Cyber Risk -- Notes -- Index -- EULA.
Record Nr. UNINA-9910713827803321
Hubbard Douglas W. <1962->  
Wiley-Blackwell
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How to measure anything in cybersecurity risk / / Douglas W. Hubbard, Richard Seiersen
How to measure anything in cybersecurity risk / / Douglas W. Hubbard, Richard Seiersen
Autore Hubbard Douglas W. <1962->
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2016
Descrizione fisica 1 online resource (299 p.)
Disciplina 658.4/78
Collana THEi Wiley ebooks
Soggetto topico Cyberterrorism
Cyberspace - Security measures
Risk management
ISBN 1-119-22461-6
1-119-22460-8
1-119-16231-9
Classificazione BUS061000COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto How to Measure Anything in Cybersecurity Risk; Contents; Foreword; Foreword; Acknowledgments; About the Authors; Introduction; Why This Book, Why Now?; What Is This Book About?; What to Expect; Is This Book for Me?; We Need More Than Technology; New Tools for Decision Makers; Our Path Forward; Part I Why Cybersecurity Needs Better Measurements for Risk; Chapter 1 The One Patch Most Needed in Cybersecurity; The Global Attack Surface; The Cyber Threat Response; A Proposal for Cybersecurity Risk Management; Notes; Chapter 2 A Measurement Primer for Cybersecurity; The Concept of Measurement
Explaining the Elements of the Loss Exceedance CurveGenerating the Inherent and Residual Loss Exceedance Curves; Where Does the Risk Tolerance Curve Come from?; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?; So What? Does This Apply to Cybersecurity?; Tools for Improving the Human Component
The Subjective Probability ComponentThe Expert Consistency Component; The Collaboration Component; The Decomposition Component; Summary and Next Steps; Notes; Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk; Scanning the Landscape: A Survey of Cybersecurity Professionals; What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix; The Psychology of Scales and the Illusion of Communication; How the Risk Matrix Doesn't Add Up; Amplifying Effects: More Studies Against the Risk Matrix (As If We Needed More); Exsupero Ursus and Other Fallacies
Beliefs about the Feasibility of Quantitative Methods: A Hard TruthSame Fallacy: More Forms; The Target Breach as a Counter to Exsupero Ursus; Communication and Consensus Objections; Conclusion; Notes; Part II Evolving the Model of Cybersecurity Risk; Chapter 6 Decompose It Unpacking the Details; Decomposing the Simple One-for-One Substitution Model; Just a Little More Decomposition; A Few Decomposition Strategies to Consider; More Decomposition Guidelines: Clear, Observable, Useful; Decision Analysis: An Overview of How to Think about a Problem; Avoiding "Over-Decomposition"
A Summary of Some Decomposition Rules
Record Nr. UNINA-9910135014503321
Hubbard Douglas W. <1962->  
Hoboken, New Jersey : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How to measure anything in cybersecurity risk / / Douglas W. Hubbard, Richard Seiersen
How to measure anything in cybersecurity risk / / Douglas W. Hubbard, Richard Seiersen
Autore Hubbard Douglas W. <1962->
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2016
Descrizione fisica 1 online resource (299 p.)
Disciplina 658.4/78
Collana THEi Wiley ebooks
Soggetto topico Cyberterrorism
Cyberspace - Security measures
Risk management
ISBN 1-119-22461-6
1-119-22460-8
1-119-16231-9
Classificazione BUS061000COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto How to Measure Anything in Cybersecurity Risk; Contents; Foreword; Foreword; Acknowledgments; About the Authors; Introduction; Why This Book, Why Now?; What Is This Book About?; What to Expect; Is This Book for Me?; We Need More Than Technology; New Tools for Decision Makers; Our Path Forward; Part I Why Cybersecurity Needs Better Measurements for Risk; Chapter 1 The One Patch Most Needed in Cybersecurity; The Global Attack Surface; The Cyber Threat Response; A Proposal for Cybersecurity Risk Management; Notes; Chapter 2 A Measurement Primer for Cybersecurity; The Concept of Measurement
Explaining the Elements of the Loss Exceedance CurveGenerating the Inherent and Residual Loss Exceedance Curves; Where Does the Risk Tolerance Curve Come from?; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?; So What? Does This Apply to Cybersecurity?; Tools for Improving the Human Component
The Subjective Probability ComponentThe Expert Consistency Component; The Collaboration Component; The Decomposition Component; Summary and Next Steps; Notes; Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk; Scanning the Landscape: A Survey of Cybersecurity Professionals; What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix; The Psychology of Scales and the Illusion of Communication; How the Risk Matrix Doesn't Add Up; Amplifying Effects: More Studies Against the Risk Matrix (As If We Needed More); Exsupero Ursus and Other Fallacies
Beliefs about the Feasibility of Quantitative Methods: A Hard TruthSame Fallacy: More Forms; The Target Breach as a Counter to Exsupero Ursus; Communication and Consensus Objections; Conclusion; Notes; Part II Evolving the Model of Cybersecurity Risk; Chapter 6 Decompose It Unpacking the Details; Decomposing the Simple One-for-One Substitution Model; Just a Little More Decomposition; A Few Decomposition Strategies to Consider; More Decomposition Guidelines: Clear, Observable, Useful; Decision Analysis: An Overview of How to Think about a Problem; Avoiding "Over-Decomposition"
A Summary of Some Decomposition Rules
Record Nr. UNINA-9910826265403321
Hubbard Douglas W. <1962->  
Hoboken, New Jersey : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HPCC/ICESS/CSS 2014 : 16th IEEE International Conference on High Performance Computing and Communications : 11th IEEE International Conference on Embedded Software and Systems : 6th International Symposium on Cyberspace Safety and Security : proceedings : 20-22 August 2014, Paris, France / / sponsored by IEEE, IEEE Computer Society, IEEE Technical Committee on Scalable Computing
HPCC/ICESS/CSS 2014 : 16th IEEE International Conference on High Performance Computing and Communications : 11th IEEE International Conference on Embedded Software and Systems : 6th International Symposium on Cyberspace Safety and Security : proceedings : 20-22 August 2014, Paris, France / / sponsored by IEEE, IEEE Computer Society, IEEE Technical Committee on Scalable Computing
Pubbl/distr/stampa Los Alamitos, California : , : IEEE Computer Society, , 2014
Descrizione fisica 1 online resource (91 pages)
Disciplina 004.3
Soggetto topico High performance computing
Telecommunication systems
Cyberspace - Security measures
ISBN 1-4799-6123-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Pages 1-644 -- 2. Pages 645-1295.
Record Nr. UNINA-9910131346603321
Los Alamitos, California : , : IEEE Computer Society, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HPCC/ICESS/CSS 2014 : 16th IEEE International Conference on High Performance Computing and Communications : 11th IEEE International Conference on Embedded Software and Systems : 6th International Symposium on Cyberspace Safety and Security : proceedings : 20-22 August 2014, Paris, France / / sponsored by IEEE, IEEE Computer Society, IEEE Technical Committee on Scalable Computing
HPCC/ICESS/CSS 2014 : 16th IEEE International Conference on High Performance Computing and Communications : 11th IEEE International Conference on Embedded Software and Systems : 6th International Symposium on Cyberspace Safety and Security : proceedings : 20-22 August 2014, Paris, France / / sponsored by IEEE, IEEE Computer Society, IEEE Technical Committee on Scalable Computing
Pubbl/distr/stampa Los Alamitos, California : , : IEEE Computer Society, , 2014
Descrizione fisica 1 online resource (91 pages)
Disciplina 004.3
Soggetto topico High performance computing
Telecommunication systems
Cyberspace - Security measures
ISBN 1-4799-6123-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Pages 1-644 -- 2. Pages 645-1295.
Record Nr. UNISA-996279288703316
Los Alamitos, California : , : IEEE Computer Society, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security [[electronic resource] ] : better implementation of controls for mobile devices should be encouraged : report to congressional committees
Information security [[electronic resource] ] : better implementation of controls for mobile devices should be encouraged : report to congressional committees
Pubbl/distr/stampa [Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2012]
Descrizione fisica 1 online resource (iii, 48 pages) : illustrations (some color)
Soggetto topico Smartphones - Security measures - Government policy - United States
Mobile computing - Security measures - Government policy - United States
Cyberspace - Security measures
Portable computers - Security measures - United States
Wireless communication systems - Security measures - United States
Mobile communication systems - Security measures - United States
Cell phones - Security measures - United States
Data protection - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Information security
Record Nr. UNINA-9910704312303321
[Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2012]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui